frontpage.
newsnewestaskshowjobs

Made with ♥ by @iamnishanth

Open Source @Github

fp.

Open in hackernews

New Nginx Exploit

https://github.com/DepthFirstDisclosures/Nginx-Rift
101•hetsaraiya•1h ago

Comments

hetsaraiya•1h ago
Just saw this pop up — full public PoC for CVE-2026-42945 ("NGINX Rift"), a heap buffer overflow in NGINX's ngx_http_rewrite_module that's been there since 0.6.27 (2008).

It triggers on a very common pattern: a `rewrite` directive (with an unnamed capture like $1/$2 and a `?` in the replacement string) followed by `set`, `if`, or another `rewrite`. The root cause is a classic two-pass script engine bug (length calculation vs. actual copy pass with ngx_escape_uri).

The PoC turns it into unauthenticated RCE using cross-request heap feng shui + pool cleanup pointer corruption. Tested with a simple Docker setup.

- Repo + Python exploit: https://github.com/DepthFirstDisclosures/Nginx-Rift - Full technical write-up: https://depthfirst.com/research/nginx-rift-achieving-nginx-r... - F5 advisory + patches (1.31.0 / 1.30.1 for OSS, plus Plus updates): https://my.f5.com/manage/s/article/K000160932 (or the latest K000161019)

Affects basically any NGINX doing URL rewriting in front of apps/PHP/etc. Workaround mentioned is switching to named captures.

The discovery angle is also interesting — it was found autonomously by depthfirst's security analysis tool after one-click onboarding of the NGINX source.

Anyone running NGINX in production using rewrite rules? How are you checking your configs? Thoughts on the exploit chain or the AI-assisted finding process?

stephenlf•1h ago
Crap
hmokiguess•1h ago
I read that in my own voice, so relatable hahahaha
Twirrim•1h ago
Given it relies on ASLR being disabled, it's extremely unlikely you're at any risk from this.
Tepix•11m ago
That‘s wishful thinking
jmaw•1h ago
Wow, coming from the webdev world. It is so funny seeing NGINX, one of the widest used web servers in the world, on version 1.x. React is on version 19. Really shows how differently new vs. old software is designed and built, and not necessarily in a good way.

https://world.hey.com/dhh/finished-software-8ee43637 https://josem.co/the-beauty-of-finished-software/

joecool1029•1h ago
lighttpd still around too, on 1.4.82, not too much changed there.
ranger_danger•1h ago
They've been working on version 2.0 for many years now as well, I wonder when they think a release might happen.
ranger_danger•1h ago
I chalk that up more to different versioning schemes rather than how much work is being done. If nginx changed whole numbers like react did, I bet it would be even higher.
syoc•58m ago
I guess someone need to update https://0ver.org/ then.
shooly•58m ago
> not necessarily in a good way

How do you think versioning works? You know that it's completely arbitrary and up to the author, right? Very ironic comment.

0x457•57m ago
That's because nginx doesn't break things for end user every release, so there is no reason to bump major version.
embedding-shape•54m ago
I bet nginx doesn't even follow semantic versioning, which you seem to be talking about.
chasd00•55m ago
anyone can choose any version string convention they want for their project. Comparing two different pieces of software by their version string doesn't make sense.
danslo•1h ago
This one's pretty bad but there are some preconditions.

Requires a "rewrite" directive with a questionmark in the replacement string, and then a subsequent "set" directive that references a regex capture group (e.g. set $var $1).

Also the POC assumes ASLR is disabled.

dsr_•58m ago
Does any distro disable ASLR by default?

If you were to do it by hand, nginx doesn't come to mind as a likely candidate.

argee•58m ago
Example: https://github.com/DepthFirstDisclosures/Nginx-Rift/blob/mai...
jcalvinowens•59m ago
The POC disables aslr: https://github.com/DepthFirstDisclosures/Nginx-Rift/blob/mai...
linkregister•53m ago
Worker processes are forked from the master, which means they receive the same memory layout. You get unlimited crashes against the worker. There's probably a way to exploit that to get a read oracle. At the very least this is a reliable denial of service.

Depth First's full writeup: https://depthfirst.com/research/nginx-rift-achieving-nginx-r...

jcalvinowens•36m ago
Sure, but I think the github README ought to make it more clear the POC as-is doesn't work against nginx on any current Linux distro.
ChrisArchitect•56m ago
Better links:

https://depthfirst.com/research/nginx-rift-achieving-nginx-r... (https://news.ycombinator.com/item?id=48126029)

https://depthfirst.com/nginx-rift (https://news.ycombinator.com/item?id=48123365)

panzi•53m ago
Does Debian 12 have this patched? But I guess I'm not affected if I don't use `rewrite` or `set` anywhere?
iririririr•8m ago
I find it very unlikely that anyone using nginx does NOT use `set` at least.

Most nginx use cases are to end tls and then pass the request to node/php/go/etc. So, I bet you have at least one set with attacker controller data on a line like 'proxy_set_header X-Host $host;'

neomantra•45m ago
The official F5 page is here: https://my.f5.com/manage/s/article/K000161019

As noted elsewhere, ASLR protects you. While you are waiting for your affected platform to get the fix, they note the mitigation:

"use named captures instead of unnamed captures in rewrite definition"

"To mitigate this vulnerability for this example, replace $1 and $2 with the appropriate named captures, $user_id and $section"

F5 patched 1.31.0 and 1.30.1.

OpenResty has a patch for 1.27 and 1.29: https://github.com/openresty/openresty/commit/ee60fb9cf645c9...

You can track OpenResty's (a Lua application server based on Nginx) progress here: https://github.com/openresty/openresty/issues/1119

RagingCactus•44m ago
As a security person it is tiring to see so many people here either directly claim or at least allude to the claim that this is somehow much less scary because the _published_ exploit does not bypass ASLR. The writeup claims there is a way to reliably bypass ASLR with this attack. And that is a good default assumption I would be willing to believe without evidence.

ASLR is a defense-in-depth technique intended to make exploitation more difficult. In almost all cases it is only a matter of time and skill to also include an ASLR bypass. Both requirements continue being lowered by LLM agents every few weeks. It is only a matter of time (and probably not a lot of time) until a fully weaponized exploit is developed. It may be published, it may also be kept private.

It is straight up wrong to say "if you have ASLR enabled, you're not at any risk from this" and saying this is extremely harmful for anyone that trusts claims like that.

This wrong belief that you shouldn't care about security vulnerabilities because mitigations may make exploitation more difficult has already caused so much harm in the past. Be glad that modern mitigations exist, but patch your stuff asap. If you are a vendor, do not treat vulnerability reports as invalid because the researcher has not provided an ASLR bypass. Fix the root cause and hope mitigations buy you enough time to patch before you get owned.

embedding-shape•19m ago
> and saying this is extremely harmful for anyone that trusts claims like that.

Kind of feels like the burden is on the one who is reading it though, good luck stopping people from spreading misinformation on the internet, most of them don't even know they're wrong.

What's extremely harmful is trusting random internet comments stating stuff confidently. Get good at seeing through that, and it'll serve you well in security and beyond.

ptx•23m ago
Is there a good alternative to Apache and Nginx that's written in a memory safe language and not full of security holes? I briefly looked at Jetty (written in Java) and Caddy (written in Go) but they seem to have a history of vulnerabilities of other types (e.g. shell injection in Jetty) so I'm not sure they would be any better.
embedding-shape•18m ago
Caddy been a breeze to use, bit sucky model with "we have thousands of binaries depending on what combination of plugins you want" instead of a proper plugin system, but if you're building it from source, it's pretty nifty and simple anyways.

70 years of love, empowerment, and freedom. A look at Eurovision by its lyrics

https://puntofisso.net/eurovision/
1•sebg•1m ago•0 comments

AlanLukacovic

1•AlanLukacovic•2m ago•0 comments

The AI Zombification of Universities

https://www.thenewcritic.com/p/the-great-zombification
3•rmdmphilosopher•4m ago•0 comments

Anthropic moves Claude Code SDK and Claude -p out of subscription plans

https://twitter.com/ClaudeDevs/status/2054610152817619388
3•deviantintegral•4m ago•0 comments

Hoot 0.9.0 Released

https://spritely.institute/news/hoot-0-9-0-released.html
3•birdculture•5m ago•0 comments

Ask HN: Anyone have experience with infomaniak.com? Are they a scam?

1•OhMeadhbh•5m ago•0 comments

AMD will bring FSR 4 to RDNA 3 GPUs

https://twitter.com/jackhuynh/status/2054904153013387273
1•LorenDB•5m ago•0 comments

The Power of a Free Popsicle (2018)

https://www.gsb.stanford.edu/insights/power-free-popsicle
1•NaOH•7m ago•0 comments

Docker demystified: create your own containers in five minutes

https://discourse.openrobotics.org/t/what-are-you-using-for-containerization-in-ros-deployments/5...
1•chfritz•8m ago•0 comments

Just Aim the Cannon Correctly

https://www.jmduke.com/posts/difficulty-scores.html
1•speckx•8m ago•0 comments

Early Access Grok Build CLI

https://x.ai/cli
2•skp1995•9m ago•0 comments

SQLite affinity is stranger than it looks, a peek inside

https://theconsensus.dev/p/2026/05/06/sqlite-affinity.html
2•eatonphil•10m ago•0 comments

Brazil markets rattled by report linking Flavio Bolsonaro to disgraced banker

https://www.reuters.com/world/americas/brazil-markets-rattled-by-report-linking-flavio-bolsonaro-...
1•CXSHNGCB•16m ago•0 comments

Understanding the Linux Kernel: The Linux Kernel Startup

https://internals-for-interns.com/posts/linux-kernel-startup/
2•valyala•16m ago•0 comments

First public macOS kernel memory corruption exploit on Apple M5

https://blog.calif.io/p/first-public-kernel-memory-corruption
5•quadrige•16m ago•1 comments

OracleGPT: Thought Experiment on an AI Powered Executive

https://senteguard.com/blog/oraclegpt-thought-experiment-of-an-ai-powered-executive-1768719394050
1•paulpauper•16m ago•0 comments

There Is a Fire Sale on M.B.A.s

https://www.wsj.com/lifestyle/careers/there-is-a-fire-sale-on-m-b-a-s-87d56c69
1•paulpauper•16m ago•0 comments

The Most Surprising Capitalist Makeover Is Under Way in Sweden

https://www.wsj.com/world/europe/the-worlds-most-surprising-capitalist-makeover-is-under-way-in-s...
1•paulpauper•17m ago•0 comments

House Republicans Vote to Dilute Gas as Prices Rise Above $4.50

https://www.newsweek.com/republicans-vote-to-dilute-gas-as-prices-rise-above-4-50-11949494
3•solid_fuel•17m ago•1 comments

Which country will be the first to pass laws limiting Meta Ray-Ban glasses?

3•nothrowaways•18m ago•0 comments

Runge–Kutta Methods

https://en.wikipedia.org/wiki/Runge%E2%80%93Kutta_methods
1•tosh•19m ago•0 comments

Show HN: PlanBridge: open-source tool for precise feedback on coding agent plans

https://github.com/contextbridge/planbridge
3•floodfx•19m ago•0 comments

Normalizing Trajectory Models

https://arxiv.org/abs/2605.08078
1•gmays•20m ago•0 comments

Portolanmap.com: World Connectivity Map

https://portolanmap.com/
1•rembish•21m ago•1 comments

God Damn AI is making me dumb

https://jpain.io/god-damn-ai-is-making-me-dumb/
8•Eighth•22m ago•1 comments

The tortoise and the hare: will China beat the US in the race back to the moon?

https://www.theguardian.com/science/2026/apr/26/china-us-space-race-moon
1•PaulHoule•22m ago•0 comments

You Don't Align an AI, You Align with It

https://danieltan.weblog.lol/2026/05/you-dont-align-an-ai-you-align-with-it
2•danieltanfh95•22m ago•0 comments

OpenData Vector: MIT-Licensed Vector Search on Object Storage

https://www.opendata.dev/blog/introducing-vector/
4•apurvamehta•22m ago•0 comments

Micron unveils a 256 GB memory module destined for AI servers

https://www.pcgamer.com/hardware/memory/while-i-can-barely-find-two-sticks-of-16-gb-to-rub-togeth...
1•speckx•22m ago•0 comments

Grok Build

https://x.ai/news/grok-build-cli
7•meetpateltech•23m ago•2 comments